• Title/Summary/Keyword: 공격능력

Search Result 378, Processing Time 0.029 seconds

A Study of Key Pre-distribution Scheme in Hierarchical Sensor Networks (계층적 클러스터 센서 네트워크의 키 사전 분배 기법에 대한 연구)

  • Choi, Dong-Min;Shin, Jian;Chung, Il-Yong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.43-56
    • /
    • 2012
  • Wireless sensor networks consist of numerous small-sized nodes equipped with limited computing power and storage as well as energy-limited disposable batteries. In this networks, nodes are deployed in a large given area and communicate with each other in short distances via wireless links. For energy efficient networks, dynamic clustering protocol is an effective technique to achieve prolonged network lifetime, scalability, and load balancing which are known as important requirements. this technique has a characteristic that sensing data which gathered by many nodes are aggregated by cluster head node. In the case of cluster head node is exposed by attacker, there is no guarantee of safe and stable network. Therefore, for secure communications in such a sensor network, it is important to be able to encrypt the messages transmitted by sensor nodes. Especially, cluster based sensor networks that are designed for energy efficient, strongly recommended suitable key management and authentication methods to guarantee optimal stability. To achieve secured network, we propose a key management scheme which is appropriate for hierarchical sensor networks. Proposed scheme is based on polynomial key pool pre-distribution scheme, and sustain a stable network through key authentication process.

Effect of Hypersonic Missiles on Maritime Strategy: Focus on Securing and Exploiting Sea Control (극초음속 미사일이 해양전략에 미치는 영향: 해양통제의 확보와 행사를 중심으로)

  • Cho, Seongjin
    • Maritime Security
    • /
    • v.1 no.1
    • /
    • pp.241-271
    • /
    • 2020
  • The military technology currently receiving the most attention is the hypersonic missile. hypersonic is faster than the speed of sound or Mach 5+. The vast majority of the ballistic missiles that it inspired achieved hypersonic speeds as they fell from the sky. Rather than speed, today's renewed attention to hypersonic weapons owes to developments that enable controlled flight. These new systems have two sub-varieties: hypersonic glide vehicles and hypersonic cruise missiles. Hypersonic weapons could challenge detection and defense due to their speed, maneuverability, and low altitude of flight. The fundamental question of this study is: 'What effect will the hypersonic missile have on the maritime strategy?' It is quite prudent to analyze and predict the impact of technology in the development stage on strategy in advance. However, strategy is essential because it affect future force construction. hypersonic missiles act as a limiting factor in securing sea control. The high speed and powerful destructive power of the hypersonic missile are not only difficult to intercept, but it also causes massive ship damage at a single shot. As a result, it is analyzed that the Securing sea control will be as difficult as the capacity of sea denial will be improved geographically and qualitatively. In addition, the concept of Fortress Fleet, which was criticized for its passive strategy in the past, could be reborn in a modern era. There are maritime power projection/defence, SLOC attack/defence in exploiting sea control. The effects of hypersonic missiles on exploiting sea control could be seen as both limiting and opportunity factors.

  • PDF

A Research on Adversarial Example-based Passive Air Defense Method against Object Detectable AI Drone (객체인식 AI적용 드론에 대응할 수 있는 적대적 예제 기반 소극방공 기법 연구)

  • Simun Yuk;Hweerang Park;Taisuk Suh;Youngho Cho
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.119-125
    • /
    • 2023
  • Through the Ukraine-Russia war, the military importance of drones is being reassessed, and North Korea has completed actual verification through a drone provocation towards South Korea at 2022. Furthermore, North Korea is actively integrating artificial intelligence (AI) technology into drones, highlighting the increasing threat posed by drones. In response, the Republic of Korea military has established Drone Operations Command(DOC) and implemented various drone defense systems. However, there is a concern that the efforts to enhance capabilities are disproportionately focused on striking systems, making it challenging to effectively counter swarm drone attacks. Particularly, Air Force bases located adjacent to urban areas face significant limitations in the use of traditional air defense weapons due to concerns about civilian casualties. Therefore, this study proposes a new passive air defense method that aims at disrupting the object detection capabilities of AI models to enhance the survivability of friendly aircraft against the threat posed by AI based swarm drones. Using laser-based adversarial examples, the study seeks to degrade the recognition accuracy of object recognition AI installed on enemy drones. Experimental results using synthetic images and precision-reduced models confirmed that the proposed method decreased the recognition accuracy of object recognition AI, which was initially approximately 95%, to around 0-15% after the application of the proposed method, thereby validating the effectiveness of the proposed method.

A Study on North Korea's Nuclear Posture Based on India and Pakistan Case Analysis (인도와 파키스탄 사례 분석에 따른 북한의 핵태세 연구)

  • Cho YongSung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.299-304
    • /
    • 2024
  • Beyond the first nuclear age, which pitted the United States and the Soviet Union against each other, we are now in the second nuclear age, in which the decision-makers of nuclear weapons are diversified among countries large and small. India and Pakistan, two such countries, are antagonistic toward each other and possess nuclear weapons, but their nuclear posture and nuclear strategies are different. The examples of these two countries can provide clues to the future nuclear posture of North Korea, which faces South Korea. In particular, Pakistan's chosen posture of pre-emptive deterrence is a highly offensive nuclear posture that threatens to use nuclear weapons against an adversary to deter aggression. This is an option that can be accomplished even with a small nuclear arsenal that can be used as a first strike, so it seems to be the optimal posture for a nuclear-powered Pakistan to choose in response to an Indian threat. North Korea, which is outgunned by the United States and South Korea, is likely to continue to threaten to use nuclear weapons preemptively like Pakistan. However, it is expected to be defensive and quite conservative, like India, until it actually uses them to maintain its regime.

Chemical Reactions in Surfactant Solutions (Ⅳ) : Micellar Rate Effect on Reactions of Hydroxide and o-Iodosobenzoate Ions with Organic Phosphinates (계면활성제 용액속에서의 화학반응 (제 4 보) : $OH^-$ 및 o-Iodosobenzoate 이온에 의한 유기 포스피네이트의 탈인산화 반응에 미치는 CTAX 미셀의 영향)

  • Hong, Yeong Seok;Kim, Hyeon Muk
    • Journal of the Korean Chemical Society
    • /
    • v.38 no.10
    • /
    • pp.753-762
    • /
    • 1994
  • Dephosphorylation of diphenyl- or isopropylphenyl-4-nitrophenylphosphinate (DPNPIN or IPNPIN) mediated by $OH^-$ or o-iodosobenzoate ion ($IB^-$) are relatively slow in aqueous solution. The reactions in CTAX micellar solutions are, however, very accelerated, because CTAX micelles can accommodate both reactants in their Stern layer in which they can easily react, while hydrophilic $OH^-$(or $IB^-$) and hydrophobic phosphinates are not mixed in water. Even though the concentrations (> $10^{-3}$ M) of $OH^-$(or $IB^-$) in CTAX solutions are much larger amounts than those ($6{\times}10^{-6}$ M) of phosphinates, the rate constants of the dephosphorylations are largely influenced by change of the concentration of the ions, which means that the reactions are not followed by the pseudo first order kinetics. In comparison to effect of the counter ions of CTAX in the reactions, CTACl is more effective on the dephosphorylation of DPNPIN (or IPNPIN) than CTABr due to easier expelling of $Cl^-$ ion by $OH^-$(or $IB^-$) ion from the micelle, because of easier solvation $Cl^-$ ion by water molecules. The reactivity of IPNPIN with $OH^-$(or $IB^-$) is lower than that of DPNPIN. The reason seems that the 'bulky' isopropyl group of IPNPIN hinders the attack of the nucleophiles. The mechanism of reaction of IPNPIN with IB- ion concluded as 'nucleophilic' instead of 'general basic' by a trapping experiment and a measured kinetic isotope effect.

  • PDF

Cation Exchange Capacities, Swelling, and Solubility of Clay Minerals in Acidic Solutions : A Literature Review

  • Park, Won Choon
    • Economic and Environmental Geology
    • /
    • v.12 no.1
    • /
    • pp.41-49
    • /
    • 1979
  • A literature review is made on the physical and chemical characteristics of clay minerals in acidic solutions from the mineralogical and hydrometallurgical viewpoints. Some of the important characteristics of clays are their ability to cation exchange, swelling, and incongruent dissolution in acidic solutions. Various clay minerals can take up metallic ions from solution via cation exchange mechanism. Generally, cation exchange capacity increases in the following order : kaolinite, halloysite, illite, vermiculite, and montmorillonite. In acidic solutions, the cation uptake such as copper by clay minerals is strongly inhibited by hydrogen and aluminum ions and thus is not economically significant factor for recovery of metals such as uranium and copper. In acidic solutions, the cation uptake is substial. Swelling is minimal at lower pH, possibly due to lattice collapse. Swelling may be controllable with montmorillonite type clays by exchanging interlayer sodium with lithium and/or hydroxylated aluminum species. The effect of add on clay minerals are : 1. Division of aggregates into smaller plates with increase in surface area and porosity. 2. Clay-acid reactions occur in the following order: (i) $H^+$ replacement of interlayer cations, (ii) removal of octahedral cations, such as Al, Fe, and Mg, and (iii) removal of tetrahedral Al ions. Acid attack initiates, around the edges of the clay particles and continued inward, leaving hydrated silica gel residue around the edges. 3. Reaction rates of (ii) and (iii) are pseudo-1st order and proportional to acid concentration. Rate doubles for every temperature increment of $10^{\circ}C$. Implications in in-situ leaching of copper or uranium with acid are : 1. Over the life span of the operation for a year or more, clays attacked by acid will leave silica gel. If such gel covers the surface of valuable mineral surfaces being leached, recovery could be substantially delayed. 2. For a copper deposit containing 0.5% each of clay minerals and recoverable copper, the added cost due to clay-acid reaction is about 1.5c/lb of copper (or 0.93 lbs of $H_2SO_4/1b$ of copper). This acid consumption by clay may be a factor for economic evaluation of in-situ leaching of an oxide copper deposit.

  • PDF

TIC SYMPTOM EXACERBATION ASSOCIATED WITH STREPTOCOCCAL INFECTION IN TOURETTE'S DISORDER (A군 연구균 감염이후 Antistreptolysin-O 혈중 농도 증가가 뚜렛씨 장애의 증상악화에 미치는 영향에 대한 임상 연구)

  • Joung, Yoo-Sook
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.9 no.2
    • /
    • pp.209-217
    • /
    • 1998
  • Object:The purpose of this study was to investigate that infection with group $A[{\beta}]$ hemolytic streptococcus may associate the mechanisms that cause or exacerbate the tic symptoms in some cases of Tourette's disorder Method:Fourteen cases with abrupt worsening of tics participated in this study:10 males,4 females. The subjects were divided into two groups composing of the group with increasing level of ASO titer and the group with normal level of ASO titer. The subjects were administered Yale Global Tic Severity Scale(YGTSS). Result:The global severity scores and overall TS impairment rating scores of YGTSS in the group with increasing level of ASO titer were more higher than in the group with normal level of ASO titer Conclusion:These results suggest that increasing level of ASO titer, resulting from group $A[{\beta}]$ hemolytic streptococcal infection has affected worsening the tic symptoms in Touette's disorder.

  • PDF

Biocontrol of Damping-Off(Rhizoctonia solani) in Cucumber by Trichoderma asperellum T-5 (Trichoderma asperellum T-5를 이용한 오이 모잘록병(Rhizoctonia solani)의 생물학적 제어)

  • Ryu, Ji-Yeon;Jin, Rong-De;Kim, Yong-Woong;Lee, Hyang-Burm;Kim, Kil-Yong
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.39 no.4
    • /
    • pp.185-194
    • /
    • 2006
  • A fungal strain of Trichoderma having strong chitinolytic activity was isolated from field soil enriched with crabshell for several years. Based on 5.8S rRNA, partial 18S, 28S rRNA genes, ITS1, ITS2 sequence analysis and morphological characteristics, the fungus was identified as Trichoderma asperellum and named as Trichoderma asperellum T-5 (TaT-5). The fungus released lytic enzymes such as chitinase and ${\beta}$-1, 3-glucanse, and produced six antifungal substances in chitin broth medium. To demonstrate the protective effect of TaT-5 against damping-off in cucumber plant caused by Rhizoctonia solani, TaT-5 culture broth (TA), chitin medium (CM) and distilled water (DW) were applied to each pot at 10 days after sowing, respectively. Then, the homogenized hyphae of R. solani were infected to each pot at 1 week after TaT-5 inoculation. During experimental period, fresh weight of shoot and root in cucumber plant more increased at TA treatment compared to other treatments. PR-proteins (${\beta}$-1, 3-glucanase and chitinase) activities in cucumber leaves markedly increased at CM and DW treatments, but the activity slightly increased and then decreased at TA treatment at 3 days after infection of R. solani. The activity of PR-proteins activities in cucumber roots at all treatments decreased with time where the degree of decrement was more alleviated at TA treatment than CM and DW. These results suggest that the lytic enzymes (chitinase and ${\beta}$-1, 3-glucanse) and antifungal substances produced by TaT-5 can reduce the pathogenic attack by R. solani in cucumber plants.

Development of A Network loading model for Dynamic traffic Assignment (동적 통행배정모형을 위한 교통류 부하모형의 개발)

  • 임강원
    • Journal of Korean Society of Transportation
    • /
    • v.20 no.3
    • /
    • pp.149-158
    • /
    • 2002
  • For the purpose of preciously describing real time traffic pattern in urban road network, dynamic network loading(DNL) models able to simulate traffic behavior are required. A number of different methods are available, including macroscopic, microscopic dynamic network models, as well as analytical model. Equivalency minimization problem and Variation inequality problem are the analytical models, which include explicit mathematical travel cost function for describing traffic behaviors on the network. While microscopic simulation models move vehicles according to behavioral car-following and cell-transmission. However, DNL models embedding such travel time function have some limitations ; analytical model has lacking of describing traffic characteristics such as relations between flow and speed, between speed and density Microscopic simulation models are the most detailed and realistic, but they are difficult to calibrate and may not be the most practical tools for large-scale networks. To cope with such problems, this paper develops a new DNL model appropriate for dynamic traffic assignment(DTA), The model is combined with vertical queue model representing vehicles as vertical queues at the end of links. In order to compare and to assess the model, we use a contrived example network. From the numerical results, we found that the DNL model presented in the paper were able to describe traffic characteristics with reasonable amount of computing time. The model also showed good relationship between travel time and traffic flow and expressed the feature of backward turn at near capacity.

Counter-terrorism Safety Measures in Public Facilities (다중이용시설의 대테러 안전대책)

  • Kim, Du-Hyun;Ahn, Kwang-Ho
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.37-64
    • /
    • 2010
  • Since the September 11, 2001, the motives and objectives of terrorism that have been targeted at hard targets such as key national facilities have now shifted towards soft targets such as subways, department stores, and tourist hotels; the attacks on these soft targets are steadily increasing. Simultaneous, unconventional, and indiscriminate terrorist attacks on civilians has also increased. In November, 2010, nearly forty states of the G20 and B20 (Business 20) will join in international summits to be hosted in Seoul. This coming July, an additional 350 troops will be deployed to Afghanistan for the sustainment of public security. Such events are sensitive topics, and there is the possibility of terrorist movement. Korea has successfully hosted various international events such as the APEC and ASEM Summits, and the 2002 Korea-Japan World Cup. The experiences from these events must be applied to ensure the safety of public facilities against the dangers of terrorism. First, counter-terrorism center must be established for the long-term, above the General Officer level to ensure the safety and efficiency of multilateral, international summits, as well as promoting policies and legislation aimed at preventing terrorism. Second, a terrorist threat management system must be secured and safety measures must be emphasized. Third, a fundamental structure must be established for the prevention of terrorism on public facilities, as well as legal and government action against the new threat of IED. Fourth, the police and fire fighting networks' must have a firm rapid response posture on the scene of an attack. Fifth, the state of mentality on the recognition of terrorist threats must be changed and restructured by promoting to and educating the population. Sixth, prevention measures must be established via research and academia. Seventh, for the guarantee of security in public facilities, safety management should employ cutting edge technology such as the 3D SICS and further develop and apply such technology. All methods and resources must be fully utilized for the establishment and strengthening terrorism prevention measures.

  • PDF